- Shopping Bag ( 0 items )
Want a NOOK? Explore Now
| Sect. I | Security concepts | |
| 1 | Using models | 3 |
| 2 | Defining information security | 23 |
| 3 | Information as an asset | 41 |
| 4 | Understanding threat and its relation to vulnerabilities | 57 |
| 5 | Assessing risk variables : the risk assessment process | 71 |
| Sect. II | The McCumber Cube methodology | |
| 6 | The McCumber Cube | 99 |
| 7 | Determining information states and mapping information flow | 111 |
| 8 | Decomposing the cube for security enforcement | 131 |
| 9 | Information state analysis for components and subsystems | 153 |
| 10 | Managing the security life cycle | 165 |
| 11 | Safeguard analysis | 177 |
| 12 | Practical applications of McCumber Cube analysis | 197 |
| Sect. III | Appendices | |
| App. A | Vulnerabilities | 223 |
| App. B | Risk assessment metrics | 235 |
| App. C | Diagrams and tables | 245 |
Overview